Sat.Dec 09, 2017

article thumbnail

The Wired Guide to Digital Security, From Passwords to Faraday Cages

WIRED Threat Level

In an age of nonstop breaches and hacks, here are ways to improve your online security based on your level of risk, from average user to NSA contractor.

Passwords 111
article thumbnail

What To Do If You've Been Doxed

WIRED Threat Level

If a troll is spilling your personal info across the internet, you have ways to fight back. Eva Galperin, director of cybersecurity at the EFF, shares tips.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Encrypt All of the Things, From Chats to Calls and More

WIRED Threat Level

Want to keep outsiders from listening in on your chats, phone calls, and more? Encrypt them. All of them.

article thumbnail

Smartphone Security 101: Key Steps From PINs to Permissions

WIRED Threat Level

Keep your device safe from snoops with basic precautions like setting the right PIN and vetting your app permissions.

Security 103
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Grand Tor: How to Go Anonymous Online

WIRED Threat Level

You may already be familiar with TorBrowser. But the anonymous internet has a lot more to offer.

Security 110

More Trending

article thumbnail

How to Rip the Mics Out of Your MacBook and iPhone

WIRED Threat Level

One way to make sure no one's listening in on your private conversations? Drop the mics. Literally.

Security 105
article thumbnail

Google Advanced Protection: The Most Secure Account of All

WIRED Threat Level

Google Advanced Protection offers a level of security that's hard to match. Just expect some serious convenience trade-offs along the way.

article thumbnail

How to Sweep For Bugs and Hidden Cameras

WIRED Threat Level

To keep them from listening in, take a very good look around you. And then bust out the tools.

Security 104
article thumbnail

The A-B-C’s of Keeping Your Kids Safe Online

WIRED Threat Level

You can't lock your offspring out of the internet forever. But you can prepare them to navigate it properly.

IT 98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Physical Measures to Amp Up Your Digital Security

WIRED Threat Level

Not every digital problem requires a software solution. For an added layer of safety, look to these real-world reinforcements.

article thumbnail

Resist Phishing Attacks with Three Golden Rules

WIRED Threat Level

They're preying on your emotions. Don't get stuck on their digital hooks.

article thumbnail

Extreme Security Measures for the Extra Paranoid

WIRED Threat Level

Someone with serious tools is trying to pry open your digital secrets. Don't let them.